Analysis
-
max time kernel
117s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 06:19
Static task
static1
Behavioral task
behavioral1
Sample
5f5a257f64e6154bb1466b8b6c25dc6d_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f5a257f64e6154bb1466b8b6c25dc6d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5f5a257f64e6154bb1466b8b6c25dc6d_JaffaCakes118.html
-
Size
4KB
-
MD5
5f5a257f64e6154bb1466b8b6c25dc6d
-
SHA1
759631fcf8bd40218c54884a5cb881ba06a87567
-
SHA256
9ae11cc97fcfbf67b6eb4afc819b0ebac250167a14eb614be849159bb7aa3755
-
SHA512
16315e7e50ed4a328528e9bb8456b082f2332f465a083acccbdedb29fb5e90c66a398d5392023440a89a5749af70e2a8e94c73b987672819cde8576abd38033a
-
SSDEEP
96:G8ebz0LCWroOJ/R09XmGcIzBR+or1++S/SS7AVf2vT8KjQ0:rbZ0UZ0PZZm/Qf2Zx
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427618249" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{0C93AC81-4660-11EF-BF21-724B7A5D7CD6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d990900000000020000000000106600000001000020000000b44990777b73f16e7a576699ca4ca5c883d154860602f3ceb381d03d7c428866000000000e8000000002000020000000c55bf2b29bb58dacac1164ae6de5605ad95dcb17d84feb915bef7151be506250200000008aba46abe1633a43a9871387da52c780b8c0d25536f33665e88d7c36b0e6708e400000006b57f3de30c7240ddd8daae2b3a158564dec0f9dec0a221f8fc6c85ccae2e57f7ad42dc234a880cb1cdc129821c3b54650d0ff0e2b71938360e8b2d165980318 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 607eccd66cdada01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000002f8e41e3384fa749ac47329e409d9909000000000200000000001066000000010000200000001790f00a9698ba5674765a6a20bc41da7de4adaada704fd3ce22e186507382dd000000000e80000000020000200000003bb8213e0fba7ccce1e8b6e867642f6fc460ec9daa925607966402ed7d73e743900000003060fbc5d7ada94dea79ffb3127d09f2fb6123cf9074f2a3e5e724b5e56833c0c383ff8a8d5820163fef6f98560e8b51ba87a06e381dae9791f053f15a88fa2b5dc70e1cb6b4b332d349d33e34783fa8b839727b0ae94054f7f55cbc7c75e25ad17600bf89ee73b7cab1e0fd854f41c60eefb8e058afd2d8ed7601e6c7d6cd08fa8cf34873628055ff810ed6fa99731540000000d9f890d142532667a395d9a4a640a04c20febce7b3cfb9f8da160831aaac0392820e29552d2171c9a7c95511c05df296ce11724352186d194ce923e5b641cbd6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2016 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2016 iexplore.exe 2016 iexplore.exe 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE 2344 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2344 2016 iexplore.exe 30 PID 2016 wrote to memory of 2344 2016 iexplore.exe 30 PID 2016 wrote to memory of 2344 2016 iexplore.exe 30 PID 2016 wrote to memory of 2344 2016 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\5f5a257f64e6154bb1466b8b6c25dc6d_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f04d526a2d9edfee9194e0b86a9d4a91
SHA12e4c803e632fdb89d33c610041cb94432837da04
SHA256c9104357ed21f1cedb26d4b1d6f19ae5a85c9bc87e0e8d777e3b324c7e51a84b
SHA51246d87d9b05f791ba7cf3a3374830c637515ef578eb02d80eecc79f45046f846b2f83af6845297d8748887e407c4cb06c59508e933372215e5202e2868b48361c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD561d9e05c1f6cca7032868c462f39dc4e
SHA17a8fa455ad61830828b81c795dda0367cd1401f5
SHA25615da351afd44e6c7a2b283572114dc426632609c6866bb449333cfb2eba49709
SHA51266f0be772146dc8693da54b1dcceaf98e20d389d998275e0f8e8e49960ab888309ba0c79d235f23ba1874008cac94eadb51990ce4abc6c2478e7aa07313af29f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5225e3a3043a516af21fcc29011a5bc2e
SHA1be001fcfa50bc6c6fa229dc11ba3c9e329def760
SHA2563101acb1a493eb0d30d81cef7328dc00ccf216b2d886f7103f02b54c5eecb3b4
SHA5121a6013a07297b84fee85c28eca61e6f066c584c6c209c8aacd41a769cad1bb7b01a7716b8c6097d91b07df3c2ddf2029cc993fdfce76fff8c69f048979c9eb5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5807ef2e1378e2862b501a0792dd72357
SHA1cdbf74ad0493d7684d78424e768fac0fad87a765
SHA2564b43b2405c5cbb08f8a865be61734ea14b133065e87c39e9729d056b0095fe66
SHA51217bc56b3a7c9aa64cff327fd29037dc94ae4de908fc4cde7b6aacf16a7cea66dbb46ef46b0e4b56e734b179578b54515d736e6ca908904474615920822b7e259
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f2d6f28ed5e2afd4ad31b25717195d9a
SHA177340dd4010096889a7af751e718879b1342f006
SHA2562dab9eda8708b1c59d35fd0b5287cf138206158b70671e4a8580d625939cc316
SHA512c9260921411586d815d44592425c884c9a9e103ee98b997953bef1b1efd503270ac63bf289593deaa67be0adea50a597856824501a0e5266a04237af85fd5bf4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51208f95e2231cd99ac4fdd8a5c6c4e9c
SHA11cb16eeff2706a796c106554ff40a270fcf5c850
SHA25695f3a0ca4d8a1615f039109cbd02c2d73dc3f897b4d6f242519edd6d82c44ca3
SHA512d9e6c6407000964e2dddf0c4854f520a86d0ff12311c4ff01b2c8860a8d508607dd0aa4d3ed62d12318fcd509d349bfa6496b2bb8727b75237ca9ea4356784b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5246f5ca09a651b74ea662ec13241bb75
SHA14d0d97875c640f45a238dded625459454edb46e8
SHA2562bfc8524224778c8ec6ea9da3abf6ffceb0436e3b7a1f9ce4b31514bf042a987
SHA5123153b8d83fb2d288e14a298bbc6cdaf56ba010f823fc3598f0d782abac6b1d1acd9022f8d2af063da0669d949147fc9c8b72e08fb4aaf463faa3ffa3648cef87
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d541c9cfbf35912aa7543800b7de39e7
SHA12790de2dd49f5833c64b28c3853025ec82e29e9d
SHA2561dcd4790864b13d09be863308182cc8cc0a483f7fa5ad7dacb12aeaf876faaa5
SHA512a612f66b88b767f19791a1e7c5404c17b6d6df466490e0093220bb9ffda634e737d9b8bad8ea43682f81d55191396ccb6fc7ed746b0c91813cfed988e8bbe23f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58a32ffb817d16feed5421693a2fc09b7
SHA1d1daaa019a6f9e3eb73ae341984ddb71aece7109
SHA25684d53bb904a347cbb5b972e8b3fd7effbfa12e6ae1d0ba3e71cca9ce376d0c71
SHA5127fef46bf3d8d5909dde145e4ee116aa3140b48f83c439c3c5900376eda07527d43338de996a0d117ee0a53dc239061f2705b6f9e8ea398b55a08bad6e54df595
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ffcd2620138654e14c683de8668ced3
SHA11c5a761e441e3299197c48214fd06c3cc18f24aa
SHA25668c462835a5be8f1d21d497a6b7dd0effc8f8bd9c45f23b567009aade1869d96
SHA51230ed91d1b6431782bf76625799c76054e35e6e16bd7e4133a08fc8bec7e9b47c94a20ed4a86249645f602649cb22e97a7388aebf5518e0a052b6a966949842fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535aeaaea112e373e3854660742bbc7be
SHA1624affe1686fc1c060e0f5ae76e85355cc3a9a07
SHA2567a82d5b41de43d3c6639ee9d89bb36252231045fafe2a924ece64e976a93e15f
SHA51296e4876c3a05d0b08b3111fa031850a72b20906114ecb8ef70ef85f09996b86b19a3cf0533c493f128c449e4e341479cf3e2ffd7c1989217f7572f56a3caf228
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54870c092c5f38d28efe5ba7d0fa71f38
SHA131a230b1e94b6171a249dd34f0213800d318fb59
SHA25662e565b520127af6e9de1da207c628b57015602d674de09cc72ab918adc90c48
SHA51274bc6f04c2f6820b2d32c78bea825f23dbcbbf379dd46459da8308bdc9882a978fb56c4546dd898f3964f8455bcc6c1108aa425ee4506ad4053ccd83f1ead3e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD524f20e7c19151dfcf5ecd16941c75738
SHA120ae768a12705a2d54a9f05bf6535c4ffcda0a2f
SHA25608469f0d063d926fb3bef6d114fae9a2f564bb0357d83434e5dfe29d39828299
SHA51211ac98f651a9be2c92688d2b18029662d153b8f8a5e016588fc275a4be090594a06707f2ccfbc1a7a09ca188b8c67870c0d691ddfa2215d8682175e3f3da8219
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54df9a2e590c550be8ea8d110cef8bc65
SHA1e41a0bf780c37ad57138a3093150e3402ad4ae22
SHA256507e768549ed0cc374a319e1102978f92e60182959b184702ace7231bb6cb494
SHA5126acfcf85c41a441d6542f9693248b51574b67cbabec520293a7c3c00c6de809f1a4c4aeb3373499d092420010573ccc4c1b268dc1bd84fc284c20b46bfb752cf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b1be7f814b5aa77a8e309f9f77c0c7cd
SHA197e800cfa52c6fe9589de173b45e42571971bab0
SHA2565a9302001787a8c79cdeddd61c2062fc2da312d46b717929aeb30245e4f8ad1d
SHA512fdfdc65a49363d69633f461d8914a74f61d34745b968830293c0f15aa0161168ecac4ff4897f9ddc5dc7e9f97f6f25d77e1f9427086777129731fb62ba972397
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50dc4815578508b2952a3421d997bfe11
SHA1a822b82b016bb6cec4df380f84ba4b223277028f
SHA256902f998b5c31014db6008c8ce0d6e9ed4136f85ac1801ca2bfdcf4a9dcdb9218
SHA5122d9b58cca7e5abd22653dd1be56c377f341f9b67d66ed1c7166a769cd1ce9298103106519a72ab2019cac200cb305d7ba81967215b1b2be927853883555ad7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7e4d7f68830a1608d1fee2c0c704517
SHA1730f59143c63803250863f3c163002b4c8028106
SHA256f9b1554bb4a15338cf892f52405a2f3c59904b3b07a79d61ca2b71d9af36a92b
SHA512babb43792818146082a3f2a339f3564aa8e3b01d207cb9fe288d5ac7dea592a505d37f29b543e83b41d8b49b3fa543266c5d0916ac9493a218cea05c452e13d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f948e71fc63893e8d3dd47fef0ff3d40
SHA1604b2a7f004a4719b34a9b285dd26e4413de3263
SHA256d88c365db1fbc769c2a5f55b2c87a2874f75d583a532739fc4a705d6b839857f
SHA5122d2ba5e3e62b4767cd4b4c9365fea15ce209f7d50b5c26c0a825b4c6d6b4a12743bf9b714d27b120d5a9aa7fbc4fdb40f1dd283a17f5794cea0d96b3abd79010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD511dc53beda18a2d8297305c7776dcbc2
SHA1841bc7f1967227a2ca1d2089ad92cccdb9765e77
SHA25643a6507b3b2e5e0214de016dd5bc92fb4d709119eb3f1d76ae37f280208887bd
SHA512f64db14e5c09a86cfd0aa80c5175b4d2df679c2b2381fff80f08d82e11dcc19dbcc63313d10b8458d61b593c876cdaaf6889f46ef5a9ef5a06cbe8e9059c117b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db530bb8d79c2fd96d55911678196af5
SHA19d4efa672f81c5c51b85cf57ec3fd74d7aa1edd3
SHA2563cb067e7b03cf8f42bbe286cab67649eadc23495c3928fad291a5f18f186dacc
SHA51200cf5bfcc199524e6adbf0797b6342cdc07be908ca041be29ceff9bf8621d4207854d6c1f59f8edda8fe2ba3d5a668ad6d100872dfcc03234f84cb25af944c44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD535693b643cf8c20189c4202565faf115
SHA16a0e54115669ff4ba72b317e927a0f30f179249e
SHA2568e11ad689b9eb1f01950402aff4dfb025af7d60ebb476af64804b04f27d8cdb2
SHA512a76ed77a395416de30ddaadabe03d00822b5226711d623d6f7cdbc688c01a05737ce2c8154d0b807732f87b842e41e43a508ff3286ca9bd4241a3e4576781736
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b